Vulnerabilities in pikepdf 1.6.1